Conference Program

October 4, 2017 – Day 1 Sessions

7:00 am – Registration Opens & Breakfast

8:00 am – Keynote SessionTransform your Business Model with IoTThere are up-front costs to the IoT, but the benefits hold promise for transforming your business model over the next few years. This session will talk about how connected products can deliver ROI across three categories. There include how data reduces costs, how subscription based IoT improves company revenue, and how engaging consumers develops brand affinity.

Pairing users’ data with ongoing communication is a powerful way to find out what consumers really want from your products and keep them engaged with your brand. The data you gather from your IoT products ultimately benefits everyone in your value chain, and it continues to provide rewards through your product life cycles.

Mike Merit, Vice President of Customer Success – Ayla Networks

8:45 amBuilding IoT Solutions with MRAA and UPM LibrariesThis presentation focuses primarily on the middleware components of the IoT Developer Kit: MRAA and UPM. The MRAA library provides an abstraction layer for several IoT platforms, offering C/C++, Java, JavaScript, and Python bindings to the physical pins and buses. This is subsequently used by the UPM sensor library for exposing an API intended to simplify the interaction between developers and peripherals, with over 350 different sensors, actuators and radio modules currently supported.

IoT solution designers will learn how to integrate multiple technologies into “An automatic watering system” combining the libraries for sensor interaction, cloud platform API’s, and a wide range of Intel tools. The application handles several features such as turning a water pump on and off based on a configurable schedule, detecting if the watering system is pumping as expected using a water flow sensor, keeping track of watering system using cloud data storage, and sending text messages to alert the user if the system is not working as expected. This solution also allows to set watering intervals using phone via a built-in web interface.

9:30 amLPWAN Ecosystem – It Takes a Village to Raise an Industrial IoT ApplicationEveryone’s talking about IoT, and companies are now adding IoT into their business model. However, most businesses do not have the expertise to quickly evaluate and execute on all the different components of the IoT solution stack. For companies looking to implement IoT solutions, the search of where to start, who to work with, and where to find answers can be overwhelming. It Takes a Village to Raise an Industrial IoT Application will focus on the layers of the IoT stack, explore some of the options that are available in each layer and discuss pros and cons. It Takes a Village to Raise an Industrial IoT Application will also provide some common-sense IoT implementation tips based on lessons learned working with Fortune 100 companies to startups implementing IoT solutions, so businesses can learn from the experiences of others as they move from trial to full roll out.

Ramzi Alharayeri, Director of Business Development - Sigfox

10:15 am – Networking Break in Exhibit Hall

11:00 am – Session 1IoT and LPWA: Two Acronyms that Need Each Other and WhySyed Zaeem Hosain, author of second edition of “The Definitive Guide: The Internet of Things for Business,” will share his point of view on the rise of a low bandwidth connectivity solution known as Low Power Wide Area (LPWA) networks that are optimized for the Internet of Things (IoT). In his speech, the founder of Aeris will explain what problem LPWA networks are solving and how they are built specifically for M2M and IoT communications to offer long-range, low-power consumption. He will share how LPWA networks solve cost and battery-life issues that cellular technology cannot and how LPWA networks solve range issues that technologies like Bluetooth or Bluetooth Low Energy (BLE) struggle with; and cite examples of how the need for LPWAN is much greater in industrial IoT (IIoT), civic and commercial applications. In these environments, the huge numbers of connected devices can only be supported if communications are efficient and power costs are low. Finally, Hosain will communicate a “call for action” that prompts the audience to embrace why IoT and LPWA together need each other and will help them on their journey of turning their unconnected products into connected services.

Syed Zaeem Hosain, Founder and Chief Technology Officer – Aeris

Session 2Chillin’ Like a Villain: Applying Critical Thinking to SecurityOh no, bad guys can drive everyone’s car into a ditch, take out the entire electrical grid with a USB stick and an engineered cascading failure model, and your refrigerator can be turned into a zombie (yes, an actual brain eating zombie, not just a spambot)!! Sounds a lot like evening news teasers (“The one superfood you only need to eat a teaspoon-full in order to live forever! Next, on BS News Ten!”). True security ninjas see through the FUD with brains so sharp they can cut through a granite block. Using critical thinking skills, you can focus on the real threats instead of wasting your time chasing the next shiny object.

In this session you’ll learn how to spot FUD from researchers and the press, and what attackers really want and what motivates them. This session will help you turn your intellect into a weapon of mass protection and help you apply actionable countermeasures to real threats.

11:40 am – Session 1Low Power Networking – Understanding the IoT’s SuperpowerAnalysts are unanimous: Low-power networking technologies are accelerating the growth and adoption of IoT. With all the options, how do you determine what’s right for your project? From wide-area domain in both unlicensed and licensed spectrum standards to wireless local area domain and the ground-breaking power-saving benefits of Wi-Fi. This session takes the audience through an examination of a detailed analysis, mapping the top ranking low power networking standards and the critical specifications that really the design. Understand what to look for when reviewing power specifications and the impacting dimensions such power vs. range, power vs mobility, power vs latency. Walk away learning how to best approach a cost-effective strategy that takes total cost of ownership and supply into consideration by leveraging new module design approaches that mitigate the effect of complexity caused by the proliferation of options.

This presentation takes an in-depth look at IoT applications using the Data Distribution Service (DDS) standardized connectivity protocol from the Object Management Group (OMG), with a focus on secure data communications. DDS is a proven, mature protocol, with over 10 years of implementation history across military, industrial, medical, power, automotive, and IoT industries. The DDS Security specification includes state-of-the art technologies for end-to-end secure data communications.

1:30 pm – Featured PresentationThe Internet of Things: A Reality CheckIn the last few years, IoT hype has been deafening. We’ve been bombarded by a barrage of technology messages and predictions. While all true, IoT is not really about those things. It is about thousands of organizations that already use IoT to optimize their operations, introduce new business models and create new revenue streams.

In this session, the speaker will walk in the shoes of people who are taking first steps on the IoT journey to transform their businesses, industries and careers. He will deliver new insights and broad perspectives on key drivers to IoT success, such as technologies (including Low Power Area Wide Networking), partnerships, cultures, standards, and more. Additionally, he will provide best-practice examples on how to achieve quick returns on your IoT investment.

Maciej Kranz, VP, Strategic Innovation – Cisco Systems

2:10 pm – Session 1Transitioning to LPWAN: Navigating the Non-Cellular SeaThere is currently a lot of talk surrounding non-cellular connectivity for IoT, and it can be difficult to see how to integrate these new services with your existing devices. The applications that can benefit from these technologies are almost endless, from smart roads to agriculture and renewable energy, but as LPWAN expands globally, cellular technology will help to supplement its growth. For these sectors and countless more, freedom to use both cellular and LPWAN technologies together is crucial to minimize downtime, and allows devices to be future-proofed despite major market changes. This presentation will elucidate the different options available to the IoT market today, and show that a flexible approach to connectivity is the most sensible approach in these interim stages of LPWAN.

Sam Colley, CEO – Podsystem, Inc.

Session 2IoT Security: Connecting “Smart” Business with Smart Cyber ProtectionThis presentation will examine early stage weaknesses and challenges related to IoT compliance and discuss the advantages of cyber security in the face of a growing regulatory push. We will explore leveraging FedRAMP and other cloud services as a means of meeting compliance requirements and transferring risks to the larger cloud services. Using new architecture and business paradigms of pushing IT out to benefit from IoT introduces new governance rules for global, ecosystem-level approach to information, data, and business decisions. The compliance and cyber challenges are nuanced and may impact manufacturers differently than services companies especially as it relates to floor shops and trusted insiders. The speaker will focus on sharing risk-based due diligence practices and use cases related to specific IoT compliance issues already faced by those in manufacturing and state and federal arenas. Where applicable, the speaker will extend the discussion to tactical steps for meeting FTC, CUI and DFARS compliance including privacy as it relates to advancing IoT systems.

3:30 pm – Session 1Addressing the Needs of Outdoor IoT NetworksThis presentation reviews some of the challenges of providing robust IoT networking solutions in the outdoor environment. It also delves into two emerging architectures, tower based LPWANs and wireless mesh networks with an emphasis on open standards based solutions and a quick look at some of the ongoing standards activity.

Bob Heile, Director of Standards – Wi-SUN Alliance

Session 2IoT Security: Understanding the Threats & Best Practices for Defending Against ThemAs a provider of an IoT framework product that runs on edge devices for connecting, controlling, and monitoring devices over computer networks, one thing that we have learned at Tridium is that while many organizations are taking approaches that revolve around specific technologies and the security controls of their digital assets themselves (e.g.: gateways, devices, and data), this alone is an incomplete approach. It is important to know that a successful cyber security program encompasses far more than simply an asset-focused approach or an approach that only revolves around technology. A more holistic, defense-in-depth security approach is needed – an approach that not only involves processes and technology, but revolves around people.

This presentation will briefly cover cyber security threats that face organizations utilizing IoT systems (gateway controllers, edge devices), and then it will focus on security best practices. Some of the best practices covered will be organizational, some will focus on configuration and network security, and it will also cover best practices for enforcing security best practices through technology from a product development and configuration perspective.

Kevin T. Smith, Chief Architect – Tridium

4:10 pm – Session 1Intelligent Edge Automation900 MHz Frequency-Hopping Spread Spectrum (FHSS) radios have the ability to host Process Automation Apps for intelligent command and control of remote sensors and devices. Without having to leverage municipal Wi-Fi bandwidth, lay fiber or employ cost-prohibitive cellular, cities can now take advantage of proven low-power FHSS technology to automate processes at the network edge. The proliferation of smart sensors and high-bandwidth devices makes low-power FHSS technology a viable and cybersecure wireless data option. No longer restricted to pure telemetry or I/O, FHSS increasingly supports voice and video, and can scale to form self-healing mesh networks. Because FHSS is wireless technology that spreads its signal over rapidly hopping radio frequencies, it is highly resistant to interference and is difficult to intercept. This makes it inherently cybersecure.

Moreover, transmits data over much longer distances than Wi-Fi, Bluetooth, Lora or Zigbee (up to 60 miles in some cases). By employing intelligent FHSS technology, municipalities can take advantage of real-world Fog Computing and Intelligent Edge Communication Devices. These devices can be deployed as Process Automation nodes, making decisions and taking action at the Access Level (or at the sensor or device). Indeed, not only is FHSS a reliable and robust option for IoT networks, it is also a low CAPEX and OPEX solution that can be ruggedized to work for years without maintenance.

Eddie Garcia, Technical Marketing Manager – FreeWave Technologies

Session 2IoT Security Threats – What They Are and How to Protect Against ThemThis session will review the newest security threats unique to the IoT, the opportunities for IoT device manufacturers to create security standards (and why they should), and go over suggestions for guarding against those threats within an enterprise.

In today’s IoT, it can be challenging to manage and patch IoT devices – they can be hacked in minutes. Malware can even introduce a permanent backdoor to many devices, allowing hackers to add them to a botnet whenever they wish. Worse, the functionality of many IoT devices adds the potential for “creepy” attacks that take advantage of gathered data, special functionality, and even surveillance. Both users and developers need a clearer understanding of the threats involved with the IoT. Despite its promise, it also carries huge user and enterprise risk — and the industry’s need for regulation is a timely one as production often eclipses best practices.

Jeff Finn, CEO – zvelo

5:00 pm – Cocktail Reception in Exhibit Hall

October 5, 2017 – Day 2 Sessions

7:30 am – Registration and Breakfast

8:00 am – Keynote SessionLow Power Networking Panel DiscussionLow power wireless networks are a lynch pin for an IoT system. They are the critical element connecting the remote device in a home, office, factory, or outdoor facility getting remote devices connected to the cloud. With the many wireless standards to choose from, are there applications or environments that certain ones have advantages. What drives the decision of which one to use, what’s the consequence of choosing the wrong one, how to handle security, what’s next – join us as we discuss which low power wireless technologies are best for IoT.

9:00 am – Session 1To Be or Not to Be – Open Source Conundrum for the IoT EnterpriseThere’s a strong drive by Enterprises to adopt a one-stop solution for their Internet of Things Projects. This had led to great interest in IoT Platform Vendors as well as DIY IoT Platforms. The variety of entities such as Hardware Device Manufacturers, Software vendors, Cloud providers pose a diverse set of challenges with respect to Solution-Building, Security, Scalability, Budgets. The open source movement is in some ways the spiritual core of the Internet, encompassing much of the hardware, software, and protocols that make up the global communications infrastructure — as well as championing openness, transparency, and the power of collaborative development. This session will share the pros and cons including best practices with using a Open Source frameworks and Technologies to building an End-to-End IoT Solution based on existing implementations with respect to the following topics: security with devices and the cloud, IoT network security, software updates, the benefits of API economy and management, applicability of automation frameworks.

Prasanna Sivaramakrishnan, Senior Solutions Architect – Red Hat, Inc.

Session 2New Wireless, Battery Free Sensor Technology Enables Wider Use of Sense Data in IoT ImplementationsTraditional electronic sensors are composed of three primary functions: A power source to power the electronics in the sensor, a sensing element to convert a physical parameter into digital data, and a processing block for data formatting, analysis, and communication between the sensor and the IoT network. As the demand for additional sensing nodes increases, the cost to scale using traditional electronic sensors limits the deployment of sensors in some applications.

A new type of wireless sensor is available that untethers the sensing function from the power and processing functions. These wireless, battery free electronic sensors collect data using new energy harvesting technology and a shared power and processing component. This type of sensor architecture is a complement to existing electronic sensors, and reduces the cost to scale to large numbers of sensors in certain applications. A shared sensor “hub” is used to aggregate data from multiple wireless data, and provide connectivity to the cloud for continuous monitoring, analytics, and action.

10:10 am – Session 1Introduction to OCF/IoTivityIoTivity, a Linux Foundation Collaborative Project that aims to implement the specification from the Open Connectivity Foundation (OCF), already supports a variety of operating systems, like Linux (regular variants as well as Tizen and Android) and Arduino, aiming to increase that number later. This presentation will focus on the base framework of IoTivity and will focus on how it has implemented its functionality on those operating systems. It will do that by showing examples of code. At the end, the presenter will show how different systems can connect and talk to each other via the OCF protocol as implemented by IoTivity.

Session 2Security Risks for IoT in an BYOD CultureIoT devices and BYOD policies have become the norm in enterprise environments, but the security risks associated with integrating these devices into the corporate network are becoming increasingly clear.

One of the problems with those devices that they have a free pass into the network, no one seemed to be concerned with the security issues involved with such devices. Those devices are hard or impossible to patch. They are open and available to the Internet and come with default passwords. While convenient for end users, it’s a nightmare for corporate security. In this session, Portnox CEO Ofer Amitai will explain the different risks associated with each IoT and BYOD device, depending on its architecture, demonstrate how to hack a security camera and lastly how to detect and segment these devices in the network. He will also provide a thorough approach to device management, detailing the following steps: decision to protect, assessment, prevention, onboarding, detection and response.

Ofer Amitai, CEO & Co-Founder – Portnox

10:50 am – Session 1Leveraging Low Power WAN in Traditional ApplicationsSCADA platform providers have long been in the business of anticipating the requirements of system integrators as data acquisition networks have evolved. During the last 15 years, there has been a wide adoption of IP networks as the infrastructure supporting these networks has become ubiquitous. New architectures based on low power wide area networks are the next technology evolution to impact SCADA providers. While new non-SCADA business models are emerging, there is clearly a desire to integrate these networks and the sensors that they support into traditional real-time SCADA applications. The decision facing system integrators in the current environment is whether to build the infrastructure for LPWAN or use an infrastructure provider and pay as you go.

Edward Nugent, COO – PcVue, Inc.

Session 2IoT and the Implications for Security Inside and Outside the EnterpriseIn the enterprise today, connected IoT devices are everywhere – both inside and outside corporate environments. The need to identify, manage, control and secure a quickly growing web of connections and outside devices is making the already challenging task of security even more important, and onerous. Rich Boyer, CISO at NTT Innovation Institute (NTT i3), will discuss new ways of thinking and the approaches needed to address the emerging challenges of security in the enterprise. With a focus on the challenges and specific technical solutions possible using distributed trust, mutability, autonomy, and disposability, he will show how a single cohesive security management infrastructure can be created for the enterprise while still allowing the distributed value of IoT to exist anywhere.

11:30 am – Session 1The OHIO PrinciplePassive RFID technology is a fundamental requirement of the IoT as many items, things, have no inherent technology to communicate their status or to receive data pertaining to their condition.

We will consider the challenges, and identify the device and it’s competencies and shortcomings that still need to be addressed, that can overcome the need to identify some 78% of ‘things’ in the Internet Universe, the socio economic maelstrom. The OHIO Principle provides an overarching methodology to not only allow the use of passive UHF technology but to measure the impact and frame the component use in a holistic semblance of the embedded identifier of all things, where all items, all things, all bodies are identified, assessed, even instructed based on conditional data and the metrics surrounding that data.

Dr. John Greaves, RF Solutions Architect – Lowry Solutions

Session 2Industrial IoT EcosystemWith the advent of IOT in Manufacturing sector – there is a huge trend seen where manufacturers are implementing IoT in production models and operational processes. It is often seen that manufacturing plants are digitally gloomy. There is inadequate data extracted which can give incomplete insights on key metrics which can pose production risks. Since the maintenance department is already flooded with emergency maintenance, the ability to realize the importance of predictive maintenance is negligible, consequently the plant management is blind to potential risks and how to react to strange situations.

The topic will stress on need for transforming the plant floor digitally, innovative approaches being adopted by Industries to improve production, return on assets and lower cost.

Abhijit Roy, Associate Director – Happiest Minds Technologies

12:10 pm – Networking Luncheon

1:00 pm – Session 1Home Mesh: The Next Step in Home NetworkingAs Smart Homes become a reality around the world, the focus is shifting towards home mesh to increase connectivity and meet the demands of our data-hungry lives. As we move toward the next step in home networking, we are witnessing a shift in the questions being asked; how can we increase connectivity efficiently? How can we connect smart devices and systems that are of benefit to everyone? How do we ensure consumers and businesses alike benefit?

There are many questions being asked, but, perhaps there are a lack of questions around the existing infrastructure to support these smart initiatives. Welcome G.hn. The backbone to our future infrastructure needs, capable of extending Wi-Fi coverage and performance throughout homes, businesses, and MDU’s, which can support the ultimate in-home broadband experience. G.hn creates a true hybrid network over any available medium – something that is increasingly important as the industry shifts towards next generation home networking, and the rise of home mesh networking. G.hn extends connectivity than further before, in fact further than any other technology on the market.

Dr. Len Dauphinee, President – HomeGrid Forum

Session 2The Journey from Industrial RFID to The Industrial Internet of ThingsIt’s time for RFID to grow up. A provocative statement about an industry whose products have already experienced a lifetime’s worth of evolution. However, the IoT is changing the game when it comes to asset management, real-time location and connected devices for industry. Asset information is increasingly available real-time and it’s more than just simple identification. It’s intelligence, right down to the individual asset level. More than simply where an asset is – how long has it been there, where does it needs to go, when is its next service/replacement? A 360° feedback loop where end users receive asset status and then send instruction back is essential. How will RFID get to the next level? What product features will enable true asset-level intelligence? What is the price impact as these evolve? How will other hardware and software technologies affect this growth? What standards must be applied for ease of adoption? Join us to discuss these and more about how RFID must “grow up” and grow into the IoT.

George E. Daddis, Jr. PhD, CEO and President – Omni-ID

1:40 pm – Session 1LPWAN’s Chicken & Egg ProblemAll published market research reports on LPWAN estimate business opportunities in the multibillion IoT device range in the next few years. Based on these expectations many LPWAN networks have been quickly deployed in many countries around the globe. However, the penetration of LoRa on the end-node side is to happening as fast as the LoRa Alliance would like. The same could be said of other LPWAN technologies like NB_IoT, where the demand of devices is even higher than the silicon availability. This reason for this high demand is the uncountable number of business opportunities these low cost connectivity technologies is enabling. But there is a chicken and egg problem with many of these new potential business opportunities, mainly because they are new and therefore it is unknown if they will have success or how/when a ROI is expected. For this reason, the demand for LPWAN devices is actually a demand for a Proof Of Concept devices in small amounts (few 100s to few 1,000s). This presentation analyses and compares the main LPWAN solutions from a technology and market opportunity point of view, before introducing the features and capabilities for developers of LPWAN-Flexino platform.

Dr. Juan Nogueira, Director of the Center of Excellence for Wireless and Connectivity – Flex